Pub Date : 2023-09-30DOI: 10.14421/jiska.2023.8.3.186-198
Muhammad Galih Wonoseto, Arman Maulana, Mahfud Asyari
The Indonesian government has provided the LKPP application in procuring goods and services for government agencies. However, several procurement processes at XYZ State University still do not use the LKPP application. Some of the reasons that are often stated are that the goods available in LKPP are not complete and the location of suppliers in LKPP is outside the city and the province. It is required to create an application for them at XYZ State University to promote digitization and transparency in procuring products and services at XYZ University. This application development uses the extreme programming method. This research succeeded in identifying the functionality requirements required in e-purchasing applications. The results of this research were able to realize 91.6% of all the necessary features. Some features that can be recognized include dashboard features, user access rights sharing features, goods/services requirements features, goods/services offering features, goods/services offer approval features, payment features, and specification features. The feature that has not been fulfilled is the direct purchase feature. The applications produced in this research may be adapted at universities or other government agencies.
{"title":"Rancang Bangun Aplikasi Pengadaan Barang dan Jasa Universitas Negeri XYZ dengan Metode Extreme Programming","authors":"Muhammad Galih Wonoseto, Arman Maulana, Mahfud Asyari","doi":"10.14421/jiska.2023.8.3.186-198","DOIUrl":"https://doi.org/10.14421/jiska.2023.8.3.186-198","url":null,"abstract":"The Indonesian government has provided the LKPP application in procuring goods and services for government agencies. However, several procurement processes at XYZ State University still do not use the LKPP application. Some of the reasons that are often stated are that the goods available in LKPP are not complete and the location of suppliers in LKPP is outside the city and the province. It is required to create an application for them at XYZ State University to promote digitization and transparency in procuring products and services at XYZ University. This application development uses the extreme programming method. This research succeeded in identifying the functionality requirements required in e-purchasing applications. The results of this research were able to realize 91.6% of all the necessary features. Some features that can be recognized include dashboard features, user access rights sharing features, goods/services requirements features, goods/services offering features, goods/services offer approval features, payment features, and specification features. The feature that has not been fulfilled is the direct purchase feature. The applications produced in this research may be adapted at universities or other government agencies.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136337099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-30DOI: 10.14421/jiska.2023.8.3.210-221
Gilberth Wattimury, Ahmad Faza
This study explores the application of COBIT 2019 in assessing IT governance at Yayasan Bunda Hati Kudus, a prominent educational institution. The research uses the Planning, Field Work, Reporting, and Follow-Up stages to leverage the Gallegos' framework. Findings reveal that Yayasan Bunda Hati Kudus operates at IT governance level two, employing COBIT 2019 domains BAI04, BAI05, and BAI11. Notably, the organization faces challenges in implementing IT across campuses, requiring remedies for decentralized systems, operational disruptions, and unmet needs. The study underscores COBIT's efficacy in addressing IT-related challenges and governance implementation. The novelty lies in adapting COBIT 2019 to assess IT governance within an educational context, offering tailored insights for enhancing capability levels and aligning IT strategies with organizational priorities.
本研究探讨了COBIT 2019在评估著名教育机构Yayasan Bunda Hati Kudus的IT治理中的应用。该研究使用计划、实地工作、报告和后续阶段来利用Gallegos的框架。调查结果显示,Yayasan Bunda Hati Kudus在IT治理级别2运行,使用COBIT 2019域BAI04、BAI05和BAI11。值得注意的是,组织在跨校园实现IT方面面临挑战,需要对分散的系统、操作中断和未满足的需求进行补救。该研究强调了COBIT在处理与it相关的挑战和治理实现方面的有效性。其新颖之处在于调整COBIT 2019以评估教育环境中的IT治理,为提高能力水平和将IT策略与组织优先级对齐提供量身定制的见解。
{"title":"COBIT 2019 Implementation for Enhancing IT Governance in Educational Institutions","authors":"Gilberth Wattimury, Ahmad Faza","doi":"10.14421/jiska.2023.8.3.210-221","DOIUrl":"https://doi.org/10.14421/jiska.2023.8.3.210-221","url":null,"abstract":"This study explores the application of COBIT 2019 in assessing IT governance at Yayasan Bunda Hati Kudus, a prominent educational institution. The research uses the Planning, Field Work, Reporting, and Follow-Up stages to leverage the Gallegos' framework. Findings reveal that Yayasan Bunda Hati Kudus operates at IT governance level two, employing COBIT 2019 domains BAI04, BAI05, and BAI11. Notably, the organization faces challenges in implementing IT across campuses, requiring remedies for decentralized systems, operational disruptions, and unmet needs. The study underscores COBIT's efficacy in addressing IT-related challenges and governance implementation. The novelty lies in adapting COBIT 2019 to assess IT governance within an educational context, offering tailored insights for enhancing capability levels and aligning IT strategies with organizational priorities.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136337092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Online lectures have been recognized for their existence in independent learning. However, many still don't know the scope of the business process, from the account registration process to taking exams. This article discusses business process modeling using Business Process Modeling Notation (BPMN) in online lectures on the international standard ALISON MOOC models. This research aims to overview the process and business model of MOOC online lectures with ALISON. This type of research is descriptive qualitative, which describes objective conditions based on facts the researcher found in the field. Data is collected through literature study, problem analysis, and business process modeling. This research results in modeling the online college business process at ALISON. The business process elements, from course registration to the exam implementation, are mapped in detail using the BPMN standard. Through modeling using BPMN, the process of creating an account, participant profile, course selection, course registration, learning media, completing assignments and exams, and obtaining a certificate can be described. This article provides helpful information for users interested in business process modeling and its notation in the ALISON online course.
{"title":"Pemodelan Proses Bisnis Kuliah Online MOOCs menggunakan BPMN (Studi Kasus alison.com)","authors":"Sumarsono Sumarsono, Dodi Saputro, Aulia Faqih Rifai","doi":"10.14421/jiska.2023.8.3.199-209","DOIUrl":"https://doi.org/10.14421/jiska.2023.8.3.199-209","url":null,"abstract":"Online lectures have been recognized for their existence in independent learning. However, many still don't know the scope of the business process, from the account registration process to taking exams. This article discusses business process modeling using Business Process Modeling Notation (BPMN) in online lectures on the international standard ALISON MOOC models. This research aims to overview the process and business model of MOOC online lectures with ALISON. This type of research is descriptive qualitative, which describes objective conditions based on facts the researcher found in the field. Data is collected through literature study, problem analysis, and business process modeling. This research results in modeling the online college business process at ALISON. The business process elements, from course registration to the exam implementation, are mapped in detail using the BPMN standard. Through modeling using BPMN, the process of creating an account, participant profile, course selection, course registration, learning media, completing assignments and exams, and obtaining a certificate can be described. This article provides helpful information for users interested in business process modeling and its notation in the ALISON online course.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136336313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-30DOI: 10.14421/jiska.2023.8.3.243-251
Moch. Reinaldy Destra Fachreza, Suhartono Suhartono, M. Ainul Yaqin
Some time ago, the House of Representatives passed Law (UU) Number 3 of 2022 concerning the National Capital City on January 18, 2022. Then, President Joko Widodo officially signed the IKN Law on February 15, 2022. Thus, the Indonesian capital will be moved to Penajam Paser Utara Regency and Kutai Kartanegara Regency, East Kalimantan Province. The public's response to the decision varies; many respond with supportive sentiments, but some react with unsupportive ideas. Nowadays, there are many ways to observe information collected on social media. Various responses submitted through social media can be used as sentiment classification research data. The Naïve Bayes method is commonly used for this type of research. Data was collected between February 15-25, 2023, with as many as 500 tweets. This research uses the Gaussian Naïve Bayes type because of the independence assumption made by this method. Features that do not significantly contribute to the classification can be ignored, thus reducing the impact of irrelevant features. This study aims to measure public sentiment on Twitter towards the process of moving the nation's capital. The system created provides the best trial results at 80% feature usage with 82.0% accuracy, 76.9% precision, and 100% recall.
不久前,众议院于2022年1月18日通过了关于国家首都的2022年第3号法。随后,佐科·维多多总统于2022年2月15日正式签署了《国际注册法》。因此,印尼首都将迁移到东加里曼丹省的Penajam Paser Utara Regency和Kutai Kartanegara Regency。公众对这一决定的反应各不相同;许多人的反应是支持的情绪,但有些人的反应是不支持的想法。如今,有很多方法可以观察社交媒体上收集的信息。通过社交媒体提交的各种回复可以作为情绪分类研究数据。Naïve贝叶斯方法通常用于这类研究。数据是在2023年2月15日至25日之间收集的,其中多达500条推文。本研究使用高斯Naïve贝叶斯类型,因为该方法做出了独立性假设。可以忽略对分类没有显著贡献的特征,从而减少不相关特征的影响。这项研究旨在衡量推特上公众对国家首都迁移过程的情绪。所创建的系统在80%的特征使用率下提供了最佳的试验结果,准确率为82.0%,精度为76.9%,召回率为100%。
{"title":"Klasifikasi Sentimen Masyarakat Terhadap Proses Pemindahan Ibu Kota Negara (IKN) Indonesia pada Media Sosial Twitter Menggunakan Metode Naïve Bayes","authors":"Moch. Reinaldy Destra Fachreza, Suhartono Suhartono, M. Ainul Yaqin","doi":"10.14421/jiska.2023.8.3.243-251","DOIUrl":"https://doi.org/10.14421/jiska.2023.8.3.243-251","url":null,"abstract":"Some time ago, the House of Representatives passed Law (UU) Number 3 of 2022 concerning the National Capital City on January 18, 2022. Then, President Joko Widodo officially signed the IKN Law on February 15, 2022. Thus, the Indonesian capital will be moved to Penajam Paser Utara Regency and Kutai Kartanegara Regency, East Kalimantan Province. The public's response to the decision varies; many respond with supportive sentiments, but some react with unsupportive ideas. Nowadays, there are many ways to observe information collected on social media. Various responses submitted through social media can be used as sentiment classification research data. The Naïve Bayes method is commonly used for this type of research. Data was collected between February 15-25, 2023, with as many as 500 tweets. This research uses the Gaussian Naïve Bayes type because of the independence assumption made by this method. Features that do not significantly contribute to the classification can be ignored, thus reducing the impact of irrelevant features. This study aims to measure public sentiment on Twitter towards the process of moving the nation's capital. The system created provides the best trial results at 80% feature usage with 82.0% accuracy, 76.9% precision, and 100% recall.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136336476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-30DOI: 10.14421/jiska.2023.8.3.231-242
Hanissa Rizki Kurnia, Aisyah Zahrah, Elvia Ichsazene Dina Adha, Nur Aini Rakhmawati
Data leakage can harm individuals who experience it, such as identity theft, financial fraud, or even physical security threats. This study aims to analyze scientific publications and research activities in data leakage using bibliometric techniques by involving quantitative analysis using a set of journals as reference sources. The literature for this study was obtained using Publish or Perish software with the keyword "data leakage" and a search result limit of 500. Furthermore, from these results, 85 journals relevant to the research topic were selected for visualization using VOSviewer software. The results showed that the highest number of data leakage publications occurred in 2021, namely 30 journals published that year. Based on the results of the bibliometric analysis conducted, it is known that there are 9 clusters based on keywords and 19 clusters based on author. The most frequently researched keywords include personal data, privacy, data leakage, legal protection, security, cryptography, encryption, and description. On the other hand, some keywords are rarely discussed in publications, namely, air transportation, electronics, and Caesar.
数据泄露可能会对遭受数据泄露的个人造成伤害,例如身份盗窃、金融欺诈,甚至是物理安全威胁。本研究旨在利用文献计量学技术,以一组期刊为参考来源,采用定量分析的方法,分析数据泄露中的科学出版物和研究活动。本研究的文献使用Publish or destroy软件获取,关键词为“data leak”,搜索结果限制为500。此外,从这些结果中选择与研究主题相关的85种期刊,使用VOSviewer软件进行可视化。结果显示,数据泄露发表最多的年份是2021年,共发表了30篇期刊。根据文献计量分析的结果可知,基于关键词的聚类有9个,基于作者的聚类有19个。最常被搜索的关键词包括个人数据、隐私、数据泄露、法律保护、安全、密码学、加密和描述。另一方面,一些关键词在出版物中很少被讨论,即航空运输,电子,凯撒。
{"title":"Analisis Bibliometrik Publikasi Isu Kebocoran Data Menggunakan VOSviewer","authors":"Hanissa Rizki Kurnia, Aisyah Zahrah, Elvia Ichsazene Dina Adha, Nur Aini Rakhmawati","doi":"10.14421/jiska.2023.8.3.231-242","DOIUrl":"https://doi.org/10.14421/jiska.2023.8.3.231-242","url":null,"abstract":"Data leakage can harm individuals who experience it, such as identity theft, financial fraud, or even physical security threats. This study aims to analyze scientific publications and research activities in data leakage using bibliometric techniques by involving quantitative analysis using a set of journals as reference sources. The literature for this study was obtained using Publish or Perish software with the keyword \"data leakage\" and a search result limit of 500. Furthermore, from these results, 85 journals relevant to the research topic were selected for visualization using VOSviewer software. The results showed that the highest number of data leakage publications occurred in 2021, namely 30 journals published that year. Based on the results of the bibliometric analysis conducted, it is known that there are 9 clusters based on keywords and 19 clusters based on author. The most frequently researched keywords include personal data, privacy, data leakage, legal protection, security, cryptography, encryption, and description. On the other hand, some keywords are rarely discussed in publications, namely, air transportation, electronics, and Caesar.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136336472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-30DOI: 10.14421/jiska.2023.8.3.222-230
Aniss Fatul Fu'adah, Agung Teguh Wibowo Almais, A’la Syauqi
During 2020-2021, 10,152 disasters occurred in Indonesia, significantly impacting the affected sectors. The recovery of these sectors needs to be done as quickly as possible to maintain human survival. This study aims to analyze the factors that affect sector damage after natural disasters in Indonesia and measure the classification accuracy. The data used in this research is data from the Regional Disaster Management Agency of Malang City in 2020. This study developed a web-based Decision Support System (DSS) using The Multiplicative Form Integrated MOORA (MULTIMOORA) method. This method is the result of the development of the MOORA method by adding a complete multiplication form to the MOORA method. In this study, the MULTIMOORA method was used to classify the level of damage to sectors after natural disasters. The results showed that using the MULTIMOORA method in this DSS resulted in an accuracy rate of 84% and was included in the good enough category.
{"title":"Klasifikasi Tingkat Kerusakan Sektor Pasca Bencana Alam Menggunakan Metode MULTIMOORA Berbasis Web","authors":"Aniss Fatul Fu'adah, Agung Teguh Wibowo Almais, A’la Syauqi","doi":"10.14421/jiska.2023.8.3.222-230","DOIUrl":"https://doi.org/10.14421/jiska.2023.8.3.222-230","url":null,"abstract":"During 2020-2021, 10,152 disasters occurred in Indonesia, significantly impacting the affected sectors. The recovery of these sectors needs to be done as quickly as possible to maintain human survival. This study aims to analyze the factors that affect sector damage after natural disasters in Indonesia and measure the classification accuracy. The data used in this research is data from the Regional Disaster Management Agency of Malang City in 2020. This study developed a web-based Decision Support System (DSS) using The Multiplicative Form Integrated MOORA (MULTIMOORA) method. This method is the result of the development of the MOORA method by adding a complete multiplication form to the MOORA method. In this study, the MULTIMOORA method was used to classify the level of damage to sectors after natural disasters. The results showed that using the MULTIMOORA method in this DSS resulted in an accuracy rate of 84% and was included in the good enough category.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136336482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-30DOI: 10.14421/jiska.2023.8.3.175-185
Muhammad Akbar Maulana
In our daily lives, computers and keyboards are essential tools for both work and gaming. However, despite the variety of keyboards available on the market, few consider the comfort and needs of individual users. To solve this issue, a mechanical keyboard that can be adjusted in width, shape, and positioning is required to lessen hand injuries when used for extended periods. This research produces a mechanical keyboard hardware prototype using Arduino as the main component. The device will be connected to an electronic circuit and use C Language as supporting software. Tests were conducted to compare existing keyboards on the market related to function tests, compatibility, usability, and performance tests. The results show that all hardware components function perfectly at 98% capacity.
{"title":"Pembuatan Ergonomic Mechanical Keyboard untuk Mengurangi Cidera Tangan Menggunakan Teknologi Arduino","authors":"Muhammad Akbar Maulana","doi":"10.14421/jiska.2023.8.3.175-185","DOIUrl":"https://doi.org/10.14421/jiska.2023.8.3.175-185","url":null,"abstract":"In our daily lives, computers and keyboards are essential tools for both work and gaming. However, despite the variety of keyboards available on the market, few consider the comfort and needs of individual users. To solve this issue, a mechanical keyboard that can be adjusted in width, shape, and positioning is required to lessen hand injuries when used for extended periods. This research produces a mechanical keyboard hardware prototype using Arduino as the main component. The device will be connected to an electronic circuit and use C Language as supporting software. Tests were conducted to compare existing keyboards on the market related to function tests, compatibility, usability, and performance tests. The results show that all hardware components function perfectly at 98% capacity.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136336924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-26DOI: 10.14421/jiska.2023.8.2.140-153
Muhammad Reza Velayani, M. Nuruzzaman, Agung Fatwanto, Bambang Sugiantoro
Telemedicine is a technology that provides benefits during the COVID-19 pandemic, which has been going on for more than two years. However, we have never conducted an evaluation or assessment of Telemedicine applications. In this study, we tried to look at people's acceptance of using the application, and 104 participants became respondents. This study uses the TAM (Technology Acceptance Model) method, which this method measures the influence between variables. TAM has five indicator variables: Perceived Ease of Use, Perceived Usefulness, Attitude Toward Using, Behavioral Intention, and Actual Usage. In this study, four models were made with three comparison models; then, for the results of testing the relationship between variables, three hypotheses are always accepted in each model, namely Perceived Ease of Use with Perceived Usefulness, Perception Ease of Use with Attitude Toward Using, and Behavioral Intention with Actual Usage. Then the two hypotheses always rejected in each model are Perceived Usefulness with Attitude Toward Using, Attitude Toward Using with Behavioral Intention. Then there is one hypothesis for each model that is refused, namely Perceived Usefulness with Behavioral Intention, Perceived Usefulness with Actual Usage, Perceived Ease of Use with Behavioral Intention, and Perceived Ease of Use with Actual Usage.
{"title":"Evaluasi Penerimaan Masyarakat Terhadap Aplikasi Telemedicine pada Masa Pandemi COVID-19","authors":"Muhammad Reza Velayani, M. Nuruzzaman, Agung Fatwanto, Bambang Sugiantoro","doi":"10.14421/jiska.2023.8.2.140-153","DOIUrl":"https://doi.org/10.14421/jiska.2023.8.2.140-153","url":null,"abstract":"Telemedicine is a technology that provides benefits during the COVID-19 pandemic, which has been going on for more than two years. However, we have never conducted an evaluation or assessment of Telemedicine applications. In this study, we tried to look at people's acceptance of using the application, and 104 participants became respondents. This study uses the TAM (Technology Acceptance Model) method, which this method measures the influence between variables. TAM has five indicator variables: Perceived Ease of Use, Perceived Usefulness, Attitude Toward Using, Behavioral Intention, and Actual Usage. In this study, four models were made with three comparison models; then, for the results of testing the relationship between variables, three hypotheses are always accepted in each model, namely Perceived Ease of Use with Perceived Usefulness, Perception Ease of Use with Attitude Toward Using, and Behavioral Intention with Actual Usage. Then the two hypotheses always rejected in each model are Perceived Usefulness with Attitude Toward Using, Attitude Toward Using with Behavioral Intention. Then there is one hypothesis for each model that is refused, namely Perceived Usefulness with Behavioral Intention, Perceived Usefulness with Actual Usage, Perceived Ease of Use with Behavioral Intention, and Perceived Ease of Use with Actual Usage.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45837554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-26DOI: 10.14421/jiska.2023.8.2.164-174
Muhammad Galih Wonoseto
In carrying out internal supervision duties, SPI UIN Sunan Kalijaga Yogyakarta innovates by carrying out digital document-based supervision using the Google Drive service. SPI auditors often felt problems in using Google Drive, namely having to check the completeness of financial accountability documents manually one by one by opening a file on Google Drive. One of the goals of developing this application is to facilitate SPI auditors in checking the completeness of financial accountability report documents. The problems can be solved by creating an audit application. The audit application has been developed using the FAST method. Central admin, SPI admin, operator, superior operator, auditor, team leader, technical controller, and Head of SPI are user access rights in this application. The developed application has met the minimum requirements of SPI UIN Sunan Kalijaga Yogyakarta. Other universities can adopt this application.
在执行内部监督职责方面,SPI un Sunan Kalijaga Yogyakarta创新地使用谷歌Drive服务开展基于数字文件的监督。SPI审计员在使用谷歌Drive时经常感到问题,即必须通过在谷歌Drive上打开文件来逐个手动检查财务问责文件的完整性。开发此应用程序的目标之一是方便SPI审计员检查财务责任报告文档的完整性。这些问题可以通过创建审计应用程序来解决。使用FAST方法开发了审计应用程序。中央管理员,SPI管理员,操作员,高级操作员,审计员,团队负责人,技术控制器和SPI负责人是此应用程序中的用户访问权限。开发的应用程序已满足SPI uni Sunan Kalijaga Yogyakarta的最低要求。其他大学也可以采用这个应用程序。
{"title":"Pengembangan Aplikasi Audit Satuan Pengawasan Internal UIN Sunan Kalijaga Yogyakarta","authors":"Muhammad Galih Wonoseto","doi":"10.14421/jiska.2023.8.2.164-174","DOIUrl":"https://doi.org/10.14421/jiska.2023.8.2.164-174","url":null,"abstract":"In carrying out internal supervision duties, SPI UIN Sunan Kalijaga Yogyakarta innovates by carrying out digital document-based supervision using the Google Drive service. SPI auditors often felt problems in using Google Drive, namely having to check the completeness of financial accountability documents manually one by one by opening a file on Google Drive. One of the goals of developing this application is to facilitate SPI auditors in checking the completeness of financial accountability report documents. The problems can be solved by creating an audit application. The audit application has been developed using the FAST method. Central admin, SPI admin, operator, superior operator, auditor, team leader, technical controller, and Head of SPI are user access rights in this application. The developed application has met the minimum requirements of SPI UIN Sunan Kalijaga Yogyakarta. Other universities can adopt this application.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46811838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-26DOI: 10.14421/jiska.2023.8.2.102-111
Rafika Syahranita, S. Suhartono, Syahiduz Zaman
Students must meet certain goals to earn a degree but can extend their time at university or drop out (DO). The problem of dropping out of students has become an important issue for tertiary institutions to ensure the success or graduation of students and reduce dropouts. DO can affect the accreditation of the tertiary institution. The quality of higher education institutions in Indonesia is measured based on accreditation from the National Accreditation Board for Higher Education or BAN-PT. One of the main standards measured is the Quality of Students and Graduates. The quality of educational accreditation is measured by the percentage of student graduation and the university's strategy to retain students. To predict student graduation based on graduation time categories, researchers collected academic data from students in 2012-2018 at the Informatics Engineering Study Program, State Islamic University of Maulana Malik Ibrahim Malang. The variables used as predictors are gender, type of entry pathway, and grade point average from semesters one to six. The resulting model was evaluated to obtain an accuracy value of 85.5%, a precision of 78.5%, a recall of 93.9%, and a micro f1-score of 89.8%. An accuracy value of 85.5% indicates that the system can classify properly using the logistic regression model.
{"title":"Prediksi Kategori Kelulusan Mahasiswa Menggunakan Metode Regresi Logistik Multinomial","authors":"Rafika Syahranita, S. Suhartono, Syahiduz Zaman","doi":"10.14421/jiska.2023.8.2.102-111","DOIUrl":"https://doi.org/10.14421/jiska.2023.8.2.102-111","url":null,"abstract":"Students must meet certain goals to earn a degree but can extend their time at university or drop out (DO). The problem of dropping out of students has become an important issue for tertiary institutions to ensure the success or graduation of students and reduce dropouts. DO can affect the accreditation of the tertiary institution. The quality of higher education institutions in Indonesia is measured based on accreditation from the National Accreditation Board for Higher Education or BAN-PT. One of the main standards measured is the Quality of Students and Graduates. The quality of educational accreditation is measured by the percentage of student graduation and the university's strategy to retain students. To predict student graduation based on graduation time categories, researchers collected academic data from students in 2012-2018 at the Informatics Engineering Study Program, State Islamic University of Maulana Malik Ibrahim Malang. The variables used as predictors are gender, type of entry pathway, and grade point average from semesters one to six. The resulting model was evaluated to obtain an accuracy value of 85.5%, a precision of 78.5%, a recall of 93.9%, and a micro f1-score of 89.8%. An accuracy value of 85.5% indicates that the system can classify properly using the logistic regression model.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42304462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}